Home

Description

An unauthenticated remote attacker can use firmware images to extract password hashes and brute force plaintext passwords of accounts with limited access.

PUBLISHED Reserved 2025-04-16 | Published 2026-03-10 | Updated 2026-03-10 | Assigner CERTVDE




MEDIUM: 5.3CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

Problem types

CWE-327 Use of a Broken or Risky Cryptographic Algorithm

Product status

Default status
unaffected

0.0 (custom)
affected

Default status
unaffected

0.0 (custom)
affected

Default status
unaffected

0.0 (custom)
affected

Default status
unaffected

0.0 (custom)
affected

Credits

Deutsche Telekom Security (DT Security) reporter

References

certvde.com/en/advisories/VDE-2025-079/ vendor-advisory

certvde.com/en/advisories/VDE-2025-096/ vendor-advisory

janitza.csaf-tp.certvde.com/.../white/2026/vde-2025-079.json vendor-advisory

weidmueller.csaf-tp.certvde.com/...te/2026/vde-2025-096.json vendor-advisory

cve.org (CVE-2025-41711)

nvd.nist.gov (CVE-2025-41711)

Download JSON